In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
The in_token->pages[] array is not NULL terminated. This results in
the following KASAN splat:
KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T09:01:07.206Z
Reserved: 2024-06-21T11:16:40.621Z
Link: CVE-2024-36288

Updated: 2024-08-02T03:37:04.682Z

Status : Modified
Published: 2024-06-21T12:15:10.967
Modified: 2024-11-21T09:21:59.667
Link: CVE-2024-36288
